
Radio‐frequency fingerprinting for mitigating primary user emulation attack in low‐end cognitive radios
Author(s) -
Rehman Saeed Ur,
Sowerby Kevin W.,
Coghill Colin
Publication year - 2014
Publication title -
iet communications
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.355
H-Index - 62
eISSN - 1751-8636
pISSN - 1751-8628
DOI - 10.1049/iet-com.2013.0568
Subject(s) - cognitive radio , software defined radio , transmitter , emulation , computer science , radio frequency , computer network , software , telecommunications , wireless , channel (broadcasting) , operating system , economics , economic growth
Recently, radio‐frequency (RF) fingerprinting has been proposed for mitigating primary user emulation (PUE) attacks in cognitive radio networks (CRNs). The widespread practical implementation of cognitive radio (CR) is likely to utilise software‐defined radios with a low‐end (i.e. low‐cost) receiver built with inexpensive analogue components. This study experimentally analyses the feasibility of RF fingerprinting for mitigating PUE attacks using low‐end software‐defined CRs. Seven universal software radio peripherals are used as low‐end CR receivers and their resulting performance is analysed for ad hoc and infrastructure CRN scenarios. The performance analysis is performed for the largest known data set of its kind, which consists of 490 000 measurements from seven identical transmitters across eight receivers. It is found that impairments in the front‐end of a low‐end receiver affects the accuracy of transmitter classification and this accuracy varies across receivers. The results suggest that RF fingerprinting can be effectively used for mitigating PUE attacks in an ad hoc CRN at high receiver signal‐to‐noise ratio whereas RF fingerprinting is not a practical solution for mitigating PUE attacks in an infrastructure CRN.